So the management of one shipping company raised the alarm when it found that the attacks of the pirates became suspiciously “targeted”, since the victims of the attacks were ships with a particularly valuable cargo, and in places where they were particularly vulnerable.
In addition, instead of taking a crew hostage and demanding a ransom (which happens in the vast majority of cases), the marauders began to check the bar codes on the containers, apparently knowing well what is inside.
As security experts of Verizon later established, the pirates managed to crack the logistics management system by implementing their own code to then obtain information about future shipments and routes. Since the shipping company’s database was not locally restricted, hackers hacked it from remote computers.
All this allowed the malefactors to track ships carrying the most valuable cargoes and their routes, which allowed them to plan pirate attacks in advance.
Burned pirates on the fact that they sent commands to the database in the form of plain text, not encrypted text, which allowed IT security specialists to identify the threat and stop it.